1 |
Ye, J., Dobson, S., McKeever, S., "Situation identification techniques in pervasive computing", Pervasive and Mobile Computing, vol. 8, no. 1, pp. 36-66, Feb. 2012. DOI: https://doi.org/10.1016/j.pmcj.2011.01.004
DOI
|
2 |
S.D.T. Kelly, N.K. Suryadevara, S.C. Mukhopadhyay, "Towards the Implementation of IoT for Environmental Condition Monitoring in Homes", IEEE Sensors Journal, vol. 13, no. 10, 2013. DOI: https://doi.org/10.1109/JSEN.2013.2263379
|
3 |
Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki, "A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud", IFIP International Conference on Computer Information Systems and Industrial Management CISIM 2014, pp. 112-121, 2014. DOI: https://doi.org/10.1007/978-3-662-45237-0_12
|
4 |
Lightweight Cryptography definition, https://www.cryptolux.org/index.php/Lightweight_Cryptography(accessed Aug., 03, 2017)
|
5 |
NIST, Lightweight Cryptography, https://www.nist.gov/programs-projects/lightweight-cryptography(accessed Aug., 17, 2017)
|
6 |
Z. Shi and R. B. Lee, "Bit permutation instructions for accelerating software cryptography," In Proceedings of the IEEE International Conference on Application Specific Systems, Architectures and Processors (ASAP 2000), pp. 138-148, July 2000. DOI: https://doi.org/10.1109/ASAP.2000.862385
DOI
|
7 |
J. Guo, I. Nikolic, T. Peyrin, and L. Wang, "ryptanalysis of Zorro," In IACR Cryptology ePrint Archive, 2013, 713.
|
8 |
Eli Biham. "Serpent: A New Block Cipher Proposal", Lecture Notes in Computer Science, 1998. DOI: https://doi.org/10.1007/3-540-69710-1_15
|
9 |
Mansoor Ebrahim, Shujaat Khan, Umer Bin Khalid, "Symmetric Algorithm Survey: A Comparative Analysis", International Journal of Computer Applications (0975-8887), vol. 61, no. 20, Jan. 2013.
|
10 |
Serpent, http://www.cl.cam.ac.uk/-rja14/serpent.html
|
11 |
CISCO, "IoT", https://www.cisco.com/c/en/us/solutions/internet-of-things/overview.html#-stickynav=1(accessed Jan., 10, 2017)
|
12 |
Microsoft, "iot", https://www.microsoft.com/en-us/internet-of-things/(accessed Feb., 13, 2017)
|
13 |
IBM, "iot", https://www.ibm.com/internet-of-things/ (accessed Feb., 13, 2017)
|
14 |
AJ Elbirt, C Paar, "An FPGA Implementation and Performance Evaluation of the Serpent Block Cipher", Field-Programmable Gate Arrays, International ACM Symposium on (2000), pp. 33-40, Feb. 11, 2000. DOI: https://doi.org/10.1145/329166.329176
DOI
|